J. Uramová, Pavel Scgeč, M. Moravčík, J. Papán, M. Kontšek, Jakub Hrabovsky
{"title":"生成新的IDS数据集的基础设施","authors":"J. Uramová, Pavel Scgeč, M. Moravčík, J. Papán, M. Kontšek, Jakub Hrabovsky","doi":"10.1109/ICETA.2018.8572201","DOIUrl":null,"url":null,"abstract":"This article describes the proposal of a system that was designed for effective network monitoring, analysis of network infiltration, and archiving of network flows for their later research. The article contains the design of an appropriate infrastructure for such a system under the conditions of the Department of Information Networks. The objective was to develop a methodology for creating a custom dataset that would contain normal network traffic and traffic with various types of attacks. Dataset can be used to test network attack detection methods that the research team is working on at the Department of Information Networks. We started with detailed analysis of the available datasets, which is an important source of information for creating a custom dataset, and to identify the imperfections of these datasets, and requirements, that a trusted dataset should meet. The article describes the course of implementation, testing and optimization of one of the possible solutions of such a system. The final part of the article informs about designing the appropriate infrastructure, and using the system for dataset creation. Articel describes also tools which were used to perform DoS, DDoS attacks and botnet architecture. The article follows the work presented in [1].","PeriodicalId":304523,"journal":{"name":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Infrastructure for Generating New IDS Dataset\",\"authors\":\"J. Uramová, Pavel Scgeč, M. Moravčík, J. Papán, M. Kontšek, Jakub Hrabovsky\",\"doi\":\"10.1109/ICETA.2018.8572201\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article describes the proposal of a system that was designed for effective network monitoring, analysis of network infiltration, and archiving of network flows for their later research. The article contains the design of an appropriate infrastructure for such a system under the conditions of the Department of Information Networks. The objective was to develop a methodology for creating a custom dataset that would contain normal network traffic and traffic with various types of attacks. Dataset can be used to test network attack detection methods that the research team is working on at the Department of Information Networks. We started with detailed analysis of the available datasets, which is an important source of information for creating a custom dataset, and to identify the imperfections of these datasets, and requirements, that a trusted dataset should meet. The article describes the course of implementation, testing and optimization of one of the possible solutions of such a system. The final part of the article informs about designing the appropriate infrastructure, and using the system for dataset creation. Articel describes also tools which were used to perform DoS, DDoS attacks and botnet architecture. The article follows the work presented in [1].\",\"PeriodicalId\":304523,\"journal\":{\"name\":\"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICETA.2018.8572201\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 16th International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA.2018.8572201","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This article describes the proposal of a system that was designed for effective network monitoring, analysis of network infiltration, and archiving of network flows for their later research. The article contains the design of an appropriate infrastructure for such a system under the conditions of the Department of Information Networks. The objective was to develop a methodology for creating a custom dataset that would contain normal network traffic and traffic with various types of attacks. Dataset can be used to test network attack detection methods that the research team is working on at the Department of Information Networks. We started with detailed analysis of the available datasets, which is an important source of information for creating a custom dataset, and to identify the imperfections of these datasets, and requirements, that a trusted dataset should meet. The article describes the course of implementation, testing and optimization of one of the possible solutions of such a system. The final part of the article informs about designing the appropriate infrastructure, and using the system for dataset creation. Articel describes also tools which were used to perform DoS, DDoS attacks and botnet architecture. The article follows the work presented in [1].